General

  • Target

    bank details.r01

  • Size

    782KB

  • Sample

    221218-k9c6bseb7t

  • MD5

    15b9b7f81450bd85dc714961b1c33714

  • SHA1

    dc9e77a03f8d4a991607eafe9fbfbcccedde1064

  • SHA256

    c0b1d89b0e4f6e079a7bb810f5cd970369f4a47e06a1e5cc8e094ab65c165131

  • SHA512

    a0682bee545400583dab8274fecb4dbc7c896f14e79115be180993d77d3ecb50643e1e628800e2d6c96d5d6ec1f3f9d09007b145c0fb807649b96fdd160295b6

  • SSDEEP

    24576:s8+SC9My7/e1li9kFBXLkmBiv9tAOnwLmHtowC:RiM6KbFBXA8WkCwLmHewC

Malware Config

Targets

    • Target

      bank details.exe

    • Size

      964KB

    • MD5

      1fba134acff71993a5da615ea19d804f

    • SHA1

      e4a2a00bfa2ba626fb73453175b584fa306b8594

    • SHA256

      d68266d44d18118b13f34a9c7ac9fb28d607d7b34c1a3f60145bfc1147a40177

    • SHA512

      2ac58a172a3ffaaa7b2e152deea62b62535e05ee42b0571ff9ffe901017a6bbd57e55d80bafb94cad58e9317ac2c1505b5eff9e76b8cede6b856779faf12d0fe

    • SSDEEP

      24576:yNGTgVIYbal26fVsHSPEgHn2nyXvoOBreS4G3r5/oOi3bJhxVsWy:AGT6IzEgVTTH2nyf

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks